{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T15:19:59Z","timestamp":1753888799698,"version":"3.41.2"},"reference-count":50,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T00:00:00Z","timestamp":1719532800000},"content-version":"vor","delay-in-days":179,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007414","name":"Qassim University","doi-asserted-by":"publisher","award":["QU-APC-2024-9\/1"],"award-info":[{"award-number":["QU-APC-2024-9\/1"]}],"id":[{"id":"10.13039\/501100007414","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Complexity"],"published-print":{"date-parts":[[2024,1]]},"abstract":"<jats:p>This article proposed an image encryption scheme along a novel five\u2010dimensional hyperchaotic system and a Fibonacci <jats:italic>Q<\/jats:italic>\u2010matrix (FQ\u2010matrix) for gray images. This designed algorithm follows two key stages: the confusion stage and the diffusion stage. In the confusion step and diffusion step, the placement of the plain image pixels is replaced by a 5D hyperchaotic map and pixel values are changed using the FQ\u2010matrix, respectively. The fortitude of the designed encryption scheme is concluded by countering the algorithm on statistical analysis like histogram analysis, chi\u2010square test, correlation coefficient analysis, information entropy analysis, differential attacks (NPCR, UACI), and NIST suite test. The produced algorithm\u2019s experimental evaluation indicates that the entropy, NPCR, and UACI values tend to be ideal values. The numerous analyses indicate that the proposed algorithm has a lot of characteristics like the low correlation of adjacent cipher pixels, strong security, and large key space, which can give high confidentiality in image data.<\/jats:p>","DOI":"10.1155\/2024\/5437722","type":"journal-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T18:24:04Z","timestamp":1719599044000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["5D Hyperchaotic Image Encryption Scheme Based on Fibonacci Q\u2010Matrix"],"prefix":"10.1155","volume":"2024","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-4377-1056","authenticated-orcid":false,"given":"Geeta","family":"Biban","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0003-5389-9304","authenticated-orcid":false,"given":"Renu","family":"Chugh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0460-6048","authenticated-orcid":false,"given":"Anju","family":"Panwar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9921-787X","authenticated-orcid":false,"given":"Mohammad","family":"Sajid","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2024,6,28]]},"reference":[{"key":"e_1_2_10_1_2","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/5859273"},{"key":"e_1_2_10_2_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/9363377"},{"key":"e_1_2_10_3_2","doi-asserted-by":"publisher","DOI":"10.3390\/asi5030057"},{"key":"e_1_2_10_4_2","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119391867863"},{"key":"e_1_2_10_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.02.021"},{"key":"e_1_2_10_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.10.023"},{"key":"e_1_2_10_7_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3030-8"},{"key":"e_1_2_10_8_2","doi-asserted-by":"publisher","DOI":"10.3390\/e21010044"},{"key":"e_1_2_10_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118845"},{"key":"e_1_2_10_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.05.251"},{"key":"e_1_2_10_11_2","doi-asserted-by":"publisher","DOI":"10.3390\/e24070958"},{"key":"e_1_2_10_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-03675-y"},{"key":"e_1_2_10_13_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10091066"},{"key":"e_1_2_10_14_2","doi-asserted-by":"publisher","DOI":"10.3390\/e24091270"},{"key":"e_1_2_10_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2018.01.007"},{"key":"e_1_2_10_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2019.105816"},{"key":"e_1_2_10_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-021-06542-9"},{"key":"e_1_2_10_18_2","doi-asserted-by":"crossref","unstructured":"KrishnaP. R. TejaC. V. S. andThanikaiselvanV. A chaos based image encryption using tinkerbell map functions Proceeding of the Second International Conference on Electronics Communication and Aerospace Technology (ICECA) March 2018 Coimbatore India 578\u2013582.","DOI":"10.1109\/ICECA.2018.8474891"},{"key":"e_1_2_10_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2016.10.006"},{"key":"e_1_2_10_20_2","doi-asserted-by":"publisher","DOI":"10.3390\/computation11090178"},{"key":"e_1_2_10_21_2","doi-asserted-by":"publisher","DOI":"10.33633\/jcta.v1i2.9388"},{"key":"e_1_2_10_22_2","doi-asserted-by":"publisher","DOI":"10.33633\/jcta.v1i2.9547"},{"key":"e_1_2_10_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3282160"},{"key":"e_1_2_10_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3301460"},{"key":"e_1_2_10_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3326848"},{"key":"e_1_2_10_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/access.2024.3363018"},{"key":"e_1_2_10_27_2","doi-asserted-by":"publisher","DOI":"10.3390\/s22124359"},{"key":"e_1_2_10_28_2","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/4152683"},{"key":"e_1_2_10_29_2","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad0d68"},{"key":"e_1_2_10_30_2","first-page":"1","article-title":"Lightweight encryption scheme based on a new NLFSR","author":"Kumari P.","year":"2024","journal-title":"Multimedia Tools and Applications"},{"key":"e_1_2_10_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.101041"},{"key":"e_1_2_10_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10382-8"},{"key":"e_1_2_10_33_2","doi-asserted-by":"crossref","unstructured":"KumariP.andMondalB. Lightweight stream cipher for health care IoT Proceeding of the 2023 IEEE 2nd International Conference on Industrial Electronics: Developments and Applications (ICIDeA) September 2023 Imphal India IEEE 444\u2013449.","DOI":"10.1109\/ICIDeA59866.2023.10295196"},{"key":"e_1_2_10_34_2","doi-asserted-by":"publisher","DOI":"10.5815\/ijigsp.2023.05.07"},{"key":"e_1_2_10_35_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12190-022-01699-x"},{"key":"e_1_2_10_36_2","first-page":"1071","article-title":"New four step iteration process for approximating fixed point of contraction mappings","volume":"13","author":"Chugh R.","year":"2022","journal-title":"Journal MESA"},{"key":"e_1_2_10_37_2","first-page":"7568","article-title":"Data analysis of COVID-19 pandemic: a mathematical approach","volume":"11","author":"Geeta P. A.","year":"2021","journal-title":"The Journal of Mathematics and Computer Science"},{"volume-title":"Digital Image Processing","year":"2009","author":"Gonzalez R. C.","key":"e_1_2_10_38_2"},{"volume-title":"Digital Image Publishing Using MATLAB","year":"2004","author":"Gonzalez R. C.","key":"e_1_2_10_39_2"},{"key":"e_1_2_10_40_2","doi-asserted-by":"publisher","DOI":"10.3390\/math9040372"},{"key":"e_1_2_10_41_2","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022115"},{"key":"e_1_2_10_42_2","first-page":"797","article-title":"A new experiment with the convergence and stability of logistic map via sp orbit","volume":"14","author":"Kumari S.","year":"2019","journal-title":"International Journal of Applied Engineering Research"},{"key":"e_1_2_10_43_2","doi-asserted-by":"publisher","DOI":"10.2478\/auom-2021-0041"},{"key":"e_1_2_10_44_2","article-title":"Superior tent map","volume":"28","author":"Rani M.","year":"2021","journal-title":"Nonlinear Studies"},{"key":"e_1_2_10_45_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2023.113396"},{"key":"e_1_2_10_46_2","first-page":"1","article-title":"Secure communication scheme based on a new hyperchaotic system","volume":"2022","author":"Benkouider K.","year":"2022","journal-title":"Computers, Materials and Continua"},{"key":"e_1_2_10_47_2","doi-asserted-by":"publisher","DOI":"10.1504\/ijmic.2020.10036995"},{"key":"e_1_2_10_48_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-016-3238-7"},{"volume-title":"Fibonacci and Lucas Numbers","year":"1969","author":"Hoggatt V. E.","key":"e_1_2_10_49_2"},{"volume-title":"A statistical test suite for random and pseudorandom number generators for cryptographic applications","year":"2001","author":"Rukhin A.","key":"e_1_2_10_50_2"}],"container-title":["Complexity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2024\/5437722","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T18:24:19Z","timestamp":1719599059000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2024\/5437722"}},"subtitle":[],"editor":[{"given":"Mojtaba","family":"Ahmadieh Khanesar","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2024,1]]},"references-count":50,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1]]}},"alternative-id":["10.1155\/2024\/5437722"],"URL":"https:\/\/doi.org\/10.1155\/2024\/5437722","archive":["Portico"],"relation":{},"ISSN":["1076-2787","1099-0526"],"issn-type":[{"type":"print","value":"1076-2787"},{"type":"electronic","value":"1099-0526"}],"subject":[],"published":{"date-parts":[[2024,1]]},"assertion":[{"value":"2024-01-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-29","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"5437722"}}